General

  • Target

    795a7772d3b676f3506084cc570ee756eb08f8ab065765baf8aa28ebfe4a3ccb

  • Size

    12KB

  • Sample

    240522-251jhacf2z

  • MD5

    3bc7667905776549578b89eea7f8a708

  • SHA1

    c9f63d25714372fad5d2ee9aa6d28d56033fd265

  • SHA256

    795a7772d3b676f3506084cc570ee756eb08f8ab065765baf8aa28ebfe4a3ccb

  • SHA512

    45116396cdde4352f508205e08761bd665721529d0a593010ab32b15d355229012a4b9c24b918e069e7148e73e038f24458e7fac08a672639f9c6920b3869048

  • SSDEEP

    192:ikL29RBzDzeobchBj8JONPONEJCruwrEPEjr7AhY:iq29jnbcvYJOQ82uwvr7CY

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      795a7772d3b676f3506084cc570ee756eb08f8ab065765baf8aa28ebfe4a3ccb

    • Size

      12KB

    • MD5

      3bc7667905776549578b89eea7f8a708

    • SHA1

      c9f63d25714372fad5d2ee9aa6d28d56033fd265

    • SHA256

      795a7772d3b676f3506084cc570ee756eb08f8ab065765baf8aa28ebfe4a3ccb

    • SHA512

      45116396cdde4352f508205e08761bd665721529d0a593010ab32b15d355229012a4b9c24b918e069e7148e73e038f24458e7fac08a672639f9c6920b3869048

    • SSDEEP

      192:ikL29RBzDzeobchBj8JONPONEJCruwrEPEjr7AhY:iq29jnbcvYJOQ82uwvr7CY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks